Stopping security breaches by managing AppSec posture

Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development... Read more »

New covert SharePoint data exfiltration techniques revealed

Varonis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies’ SharePoint server. “These techniques can bypass the detection... Read more »

Vultr Sovereign Cloud and Private Cloud delivers data control to nations and enterprises

Vultr launched Vultr Sovereign Cloud and Private Cloud in response to the increased importance of data sovereignty and the growing volumes of enterprise data being generated, stored and processed... Read more »

Malwarebytes Digital Footprint Portal offers insights into exposed passwords and personal data

Malwarebytes has launched Malwarebytes Digital Footprint Portal, a web portal that gives individuals deep visibility into their exposed personal information, including clear text passwords. Now, anyone can easily see... Read more »

Index Engines CyberSense 8.6 detects malicious activity

Index Engines announced the latest release of its CyberSense software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold... Read more »

Eclypsium Automata discovers vulnerabilities in IT infrastructure

Eclypsium launches Automata, a new AI-assisted feature for its digital supply chain security platform. Available now, Automata is an automated binary analysis system that replicates the knowledge and tooling... Read more »

Concentric AI unveils employee offboarding risk monitoring and reporting module

Concentric AI announced its new employee offboarding risk monitoring and reporting module that delivers critical data detection and response capabilities to identify true risk to data and secure sensitive... Read more »

Cohesity teams up with Intel to integrate confidential computing into Data Cloud Services

Cohesity has announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s cyber vault service, this data-in-use... Read more »

IT pros targeted with malicious Google ads for PuTTY, FileZilla

An ongoing malvertising campaign is targeting IT administrators looking to download system utilities such as PuTTY (a free SSH and Telnet client) and FileZilla (a free cross-platform FTP application).... Read more »

NICE Actimize enhances Integrated Fraud Management platform to help financial services prevent scams

NICE Actimize announced IFM 11 (Integrated Fraud Management), a new release of its AI-driven fraud management and detection platform. The new release leverages recent advancements in artificial intelligence together... Read more »
Subscribe to our Newsletter